johncant / node-http-tunnel
An HTTP tunnel for bypassing restrictive firewalls.
☆76Updated 10 years ago
Alternatives and similar repositories for node-http-tunnel:
Users that are interested in node-http-tunnel are comparing it to the libraries listed below
- CVE-2017-7269 to webshell or shellcode loader☆87Updated 7 years ago
- CVE-2017-0213 for command line☆57Updated 7 years ago
- scripts used in my pentest work.☆44Updated 9 years ago
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago
- ☆34Updated 8 years ago
- spring mvc cve-2014-3625☆32Updated 8 years ago
- oracle 10g sys权限通过java执行命令获得一个非交互shell的客户端,通常用于正向连接☆39Updated 8 years ago
- MS16-032(CVE-2016-0099) for SERVICE ONLY☆81Updated 7 years ago
- Small modification version of p0wnedShell☆40Updated 8 years ago
- clone from http://ujeni.murkyroc.com/hmap/☆17Updated 4 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Updated 6 years ago
- Automatically scan the inner network to detect whether they are vulnerable.☆140Updated 3 years ago
- Auto install WinPcap on Windows(command line)☆53Updated 7 years ago
- shell over icmp☆31Updated 11 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Updated 6 years ago
- RCE Exploit PoC for XMLDecoder☆63Updated 11 years ago
- Support x86 and x64☆66Updated 3 years ago
- CVE-2017-11882 exploitation☆43Updated 7 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆64Updated 7 years ago
- Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that a…☆22Updated 7 years ago
- Stealing passwords every time they change☆66Updated 4 years ago
- Automated information gathering tool for pentest☆54Updated 8 years ago
- Detect alive host and open port .☆17Updated 2 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- *NIX X11 Keylogger☆75Updated 5 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- SQLChop reverse http proxy module☆32Updated 9 years ago
- safe_tools☆26Updated 7 years ago
- ☆18Updated 6 years ago